Advertisement

Acquisition Management

  • Izzat Alsmadi
Chapter

Abstract

The process of acquiring computing resources includes several activities related to planning, budgeting, comparing alternative options, configuration and change management, etc. Our focus in this book is on securing information and computing resources. As such, selected KSAs as well as the content of each KSA will be focused on this subject only.

Bibliography

  1. (CSD), NIST Computer Security Division (2010) NISTIR 7622 draft, piloting supply chain risk management practices for federal information systems (DRAFT), pp 1–78Google Scholar
  2. Acq.osd.mil (2011) Program protection plan outline & guidance, Ver. 1.0. Deputy Assistant Secretary of Defense, Systems Engineering. https://www.acq.osd.mil/se/initiatives/init_pp-sse.html
  3. Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Ali Al-Qudah M, Al-Omari A (2018) Security and access controls: lesson plans. In: Practical information security. Springer, ChamCrossRefGoogle Scholar
  4. Alves P, Campos P, Oliveira E (2012a) Modeling the trustworthiness of a supplier agent in a B2B relationship. In: Camarinha-Matos LM, Xu L, Afsarmanesh H (eds) Collaborative networks in the internet of services. PRO-VE 2012. IFIP advances in information and communication technology, vol 380. Springer, BerlinGoogle Scholar
  5. Alves P, Campos P, Oliveira E (2012b) Modeling the trustworthiness of a supplier agent in a B2B relationship, PRO-VE 2012. International Federation for Information Processing IFIP AICT 380, pp 675–686Google Scholar
  6. Blos MF, Quaddus M, Wee HM, Watanabe K (2009) Supply chain risk management (SCRM): a case study on the automotive and electronic industries in Brazil. Supply Chain Manag 14(4):247–252CrossRefGoogle Scholar
  7. Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply chain risk management practices for federal information systems and organizations. https://doi.org/10.6028/nist.sp.800-161
  8. Defense Acquisition University Press (2001) System engineering fundamentals. http://acqnotes.com
  9. Department of Homeland Security Cyber Security Division (2007) Software assurance in acquisition: mitigating risks to the enterprise, Draft Version 1.0Google Scholar
  10. DHS (2008) Acquisition instruction/guidebook, 102-01-001, INTERIM, Version 1.9Google Scholar
  11. DOE (2018) DOE G 430.1-1 Chp 23, life cycle cost estimate. https://www.directives.doe.gov/directives-documents/400-series/0430.1-EGuide-1-Chp23
  12. Grady JO (2006) System requirements analysis. Academic, CambridgeCrossRefGoogle Scholar
  13. Hutton JP (2010) United States Government Accountability Office, Deepwater requirements, quantities, and cost require revalidation to reflect knowledge gained, GAO-10-790, https://www.gao.gov/assets/310/307742.htmlGoogle Scholar
  14. Ivancic WD, Vaden KR, Jones RE, Roberts AM (2015) Operational concepts for a generic space exploration communication network architecture, Technical report, NASA Glenn Research CenterGoogle Scholar
  15. National Institute of Standards and Technology (NIST) 800-161 (2015), Supply chain risk management practices for federal information systems and organizations. U.S. Department of Commerce, p 9Google Scholar
  16. Polydys ML, Wisseman S (2009a) Software assurance in acquisition: mitigating risks to the enterprise. Technical paper. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf
  17. Polydys ML, Wisseman S (2009b) Software assurance in acquisition: mitigating risks to the enterprise. Occasional paper, Information Resources Management College. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf
  18. Porter M (2008) Competitive advantage: creating and sustaining superior performance. Simon and Schuster, New YorkGoogle Scholar
  19. Sengupta A (2011) Method for processing documents containing restricted information: Google patentsGoogle Scholar
  20. Swanson M, Bartol N, Moorthy R (2010) Piloting supply change risk management practices for federal information systems. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, p 1Google Scholar
  21. Tummala R, Schoenherr T (2011) Assessing and managing risks using the Supply Chain Risk Management Process (SCRMP). Supply Chain Manag 16(6):474–483CrossRefGoogle Scholar
  22. US Chamber of Commerce, International Affairs (2016) Preventing de globalization: an economic and security argument for free trade and investment in ICT. https://www.uschamber.com/sites/default/files/documents/files/preventing_deglobalization_1.pdf

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  1. 1.Texas A&M UniversitySan AntonioUSA

Personalised recommendations